Abstract
The origins and history of a single case study of large-scale IT outsourcing in the 1994–99 period is investigated in the United Kingdom Defence sector. Such deals are high risk and we describe types of risk and how the client organization sought to mitigate these. These risks and mitigation approaches are then analyzed against a distinctive risk framework formulated for IT outsourcing. Risks emerging in terms of type and scope of outsourcing; vendor selection criteria and process, the role of the contract, retained capabilities and management processes, and partnering and relationship dimensions are then assessed against other research findings. Two additional distinctive risks are identified from the case history arising from the public sector context and supplier long-term market strategy. A contribution of the chapter is the revised risk framework for analyzing IT outsourcing that is then presented. Finally, we highlight the implications of these findings for future research and practice.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alberthal, L. (1994) User Satisfaction — The Global Challenge. Address to the 9th World Computing Services Congress, Yokohama, Japan.
Ang, S. and Straub, D. (1998) “Production and Transaction Economies and IS Outsourcing: A Study of the US Banking Industry”, MIS Quarterly, December, 535–542.
Ang, S. and Toh, S-K (1998) “Failure in Software Outsourcing: A Case Analysis”, in Willcocks, L. and Lacity, M. (eds) Strategic Sourcing of Information Systems, Wiley, Chichester.
Applegate, L. and Montealegre, R. (1991) “Eastman Kodak Company: Managing Information Systems through Strategic Alliances”, Harvard Business School Case 9–192-030, Harvard Business School, Boston, MA.
Auwers, T. and Deschoolmeester, D. (1993) The Dynamics of an Outsourcing Relationship: A Case Study in the Belgian Food Industry. Paper at the Outsourcing Of Information Systems Services Conference, University of Twente, The Netherlands, 20–22nd May.
Benbasat, I. and Zmud, R. (1999) “Empirical Research in Information Systems: The Practice of Relevance”, MIS Quarterly, 23, 1, 3–16.
Bicknell, D. (1996) “Special Report: Contract Dispute: Miami Blues”, Computer Weekly, 26–27.
Boehm, B. (1991) “Software Risk Management: Principles and Practices”, IEEE Software, January, 32–41.
Charette, R. (1991) Application Strategies for Risk Analysis, McGraw Hill, New York.
Clement, D. (1996) “Big Mac Poised to Sign with Big Blue”, Sunday Business — Computer Age, London, 2.
Collins, T. (1999) “End of the EDS Dream”, Computer Weekly, October 28, 1, 22.
Collins, T. and Phillips, S. (1999) “Utility To Pull Plug on Perot Systems Deal”, Computer Weekly, March 25, 1.
Craig Smith, A. (1990) “The Case Study: A Useful Research Method for Information Management”, Journal Of Information Technology, 5, 2, 123–133.
Cronk, J. and Sharp, J. (1998) “A Framework for Deciding What to Outsource in Information Technology”, in Willcocks, L. and Lacity, M. (eds), Strategic Sourcing of Information Systems, Wiley, Chichester.
Cross, J. (1995) “IT Outsourcing: British Petroleum’s Competitive Approach”, Harvard Business Review, May-June, 94–102.
Currie, W. and Willcocks, L. (1998) New Strategies in IT Outsourcing: Major Trends and Global Best Practice, Business Intelligence, London.
Davenport, T. and Markus, L. (1999) “Rigor vs. Relevance Revisited: Response to Benbasat and Zmud”, MIS Quarterly, 23, 1, 19–23.
Davies, S. and Hosein, G. (2007) Identity Policy: Risks and Rewards, LSE, London, April.
De Loof, L. (1998) “Information Systems Outsourcing: Theories, Case Evidence and a Decision Framework”, in Willeocks, L. and Lacity, M. (eds) Strategic Sourcing Of Information Systems, Wiley, Chichester.
Dempsey, M. (1999) “Outsourcing Refusenik Enjoys His Vindication”, Financial Times- IT Review, August 4, 3.
DiRomualdo, A. and Gurbaxani, V. (1998) “Strategic Intent for IT Outsourcing”, Sloan Management Review, 39, 4, 1–26.
Dunleavy, P., Margetts, H., Bastou, S. and Tinkler, J. (2007) Digital Era Governance, Oxford University Press, Oxford.
Earl, M.J. (1996) “The Risks of Outsourcing IT”, Sloan Management Review, 37, 3, 26–32.
Feeny, D., Earl, M. and Edwards, B. (1997) “Organizational Arrangements for IS: Roles of Users and Specialists”, in Willeocks, L., Feeny, D. and Islei, G. (eds) Managing IT As A Strategic Resource, McGraw Hill, Maidenhead.
Feeny, D. and Willeocks, L. (1998) “Core IS Capabilities for Exploiting IT”, Sloan Management Review, 39, 3, 1–26.
Fitzgerald, G. and Willeocks, L. (1994) Contracts and Partnerships in the Outsourcing of IT. 15th International Conference on Information Systems, Vancouver, Canada, December.
Griffiths, C. and Newman, M. (eds) (1996) “Risk Management and Information Systems”, Journal Of Information Technology, Special Issue, 11, 4.
Grover, V., Cheon, M.J. and Teng, J. (1995) Theoretical Perspectives on the Outsourcing of Information Technology. Working Paper, University of South Carolina, Columbia, 1–27.
Henderson, J.C. (1990) “Plugging into Strategic Partnerships: The Critical IS Connection”, Sloan Management Review, Spring, 7–18.
Hoffmann, T. (1996) “JP Morgan to Save $50 million Via Outsourcing Pact”, Computer-world, 30, 21, May 20, 10.
House of Commons Committee of Public Accounts (2007a) Central Governments Use of Consultants, HMSO, London HC309 June 2007.
House of Commons Committee of Public Accounts (2007b) Delivering Successful IT-enabled Business Change, HMSO, London HCl 13 June 2007.
House of Commons Committee of Public Accounts (2007c) HM Revenue and Customs: ASPIRE — The Re-competition of Outsourced IT Services, HMSO, London HCl 79 June 2007.
House of Commons Committee of Public Accounts (2007d) Department of Health: The National Programme for IT in the NHS, HMSO, London, HC390 April 2007.
Huber, R.L. (1993) “How Continental Bank Outsourced its ‘Crown Jewels’”, Harvard Business Review, January-February, 121–129.
Impact Group (1999) Creating New Value from an IT Outsourcing Relationship, Impact Report, London.
Jurison, J. (1995) “The Role of Risk and Return in Information Technology Outsourcing Decisions”, Journal Of Information Technology, 10, 4, 239–247.
Kern, T. and Willeocks, L. (1996) “The Enabling and Determining Environment: Neglected Issues in an IT/IS Outsourcing Strategy”, European Conference of Information Systems, Lisbon, Portugal.
Kern, T. and Willeocks, L. (2000) “Cooperative Relationship Strategy in Global IT Outsourcing: The Case of Xerox Corporation”, in Faulkner, D. and De Rond, M. (eds) Perspectives On Cooperation, Oxford University Press, Oxford.
Kern, T. and Willeocks, L. (2001) The Relationship Advantage: Information Technology, Sourcing and Management, Oxford University Press, Oxford.
Kern, T., Willcocks, L. and Heck, E. (1999) “Relational Trauma: Evidence of a Winner’s Curse in ICT Outsourcing”, OXIIM Working Paper 99/2, Templeton College, Oxford.
Kirkpatrick, D. (1991) “Why Not Farm Out Your Computer?”, Fortune: 73–78.
Klepper, R. (1994) “Outsourcing Relationships”, in Khosrowpour, M. (ed.) Managing Information Technology with Outsourcing, Idea Group Publishing, Harrisburg, PA.
Klepper, R. (1995) “The Management of Partnering Development in IS Outsourcing”, Journal of Information Technology, 10, 4, 249–258.
Klepper, R. and Jones, W. (1998) Outsourcing Information Technology, Systems and Services, Prentice Hall, New Jersey.
Kumar, K. and Willcocks, L. (1999) “Holiday Inn’s Passage to India”, in Carmel, E. (ed.) Global Software Teams, Prentice Hall, New Jersey.
Lacity, M.C. and Hirschheim, R. (1993) Infortnation Systems Outsourcing: Myths, Metaphors and Realities, John Wiley, Chichester.
Lacity, M. and Hirschheim, R. (1995) Beyond the Information Systems Outsourcing Bandwagon, Wiley, Chichester.
Lacity, M. and Willcocks, L. (1996) Best Practices in Information Technology Sourcing. Executive Report No 2, June. Templeton College, Oxford.
Lacity, M. and Willcocks, L. (1998) “An Empirical Investigation of Information Technology Sourcing Practices: Lessons from Experience”, MIS Quarterly, 22, 3, 363–408.
Lacity, M. and Willcocks, L. (2000) Inside IT Outsourcing: A State-Of-Art Report, Executive Research Report, Templeton College, Oxford.
Lacity, M. and Willcocks, L. (2001) Global IT Outsourcing: Search for Business Advantage, Wiley, Chichester.
Lacity, M. and Willcocks, L. (2009) Information Systems and Outsourcing: Studies in Theory and Practice, Palgrave, London.
Lacity, M., Willcocks, L. and Feeny, D. (1995) “IT Outsourcing: Maximize Flexibility And Control”, Harvard Business Review, May-June, 94–104.
Lacity, M., Willcocks, L. and Feeny, D. (1996) “The Value of Selective IT Sourcing”, Sloan Management Review, Spring, 37, 3, 13–25.
Lee, A. (1999) “Rigor and Relevance in MIS Research: Beyond the Approach of Positivism Alone”, MIS Quarterly, 23, 1, 29–33.
Lincoln, Y. and Guba, E. (1985) Naturalistic Enquiry, Sage, Beverly Hills.
Loh, L. and Venkatraman, N. (1992) “Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect”, Information Systems Research, 4, 3, 334–358.
Lyytinen, K., Mathiassen, L. and Ropponen, J. (1998) “Attention Shaping and Software Risk: A Categorical Analysis of Four Classical Risk Management Approaches”, Information Systems Research, 9, 3, 233–255.
McFarlan, F.W. and Nolan, R. (1995) “How to Manage an IT Outsourcing Alliance”, Sloan Management Review, Winter, 9–23.
McLellan, K., Marcolin, B. and Beamish, P. (1998) “Financial and Strategic Motivations Behind IS Outsourcing”, in Willcocks, L. and Lacity, M. (eds) Strategic Sourcing Of Information Systems, Wiley, Chichester.
Michell, V. and Fitzgerald, G. (1997) “IT Outsourcing, Vendor Selection and the Vendor Marketplace”, Journal of In formation Technology, 10, 3, 135–147.
Moad, J. (1993) “Inside an Outsourcing Deal”, Datamation, 20–27.
Morris, P. (1996) “Project Management: Lessons from IT and Non-IT Projects”, in Earl, M. (ed.) Information Management — The Organizational Dimension, Oxford University Press, Oxford.
National Audit Office (2006) Department of Health — The National Programme for IT in the NHS. HCl 173, HUSO, London.
National Audit Office (2008) Defence Information Infrastructure: Report to the Comptroller and Auditor General HC788 Session, HMSO, London.
Osei-Bryson, K. and Ngwenyama, O. (2006) “Managing Risks in Information Systems Outsourcing”, European Journal of Operational Research, 174, 1, 245–264.
Pettigrew, A. (1985) The Awakening Giant: Continuity and Change In ICI, Basil Blackwell, Oxford.
Pettigrew, A. (1990) “Longitudinal Field Research on Change: Theory and Practice”, Organization Science, 1, 3, 267–292.
Pettigrew, A. and Whipp, R. (1991) Managing Change for Competitive Success, Blackwell, Oxford.
Poston, T. (1997) “Lloyds Ditches 50 Million Pound Outsourcing Contract”, Computer Weekly, January 30, 1.
Reynolds, P. Willcocks, L. and Feeny, D. (2007) “Evolving IS Capabilities to Leverage the External IT Services Market”, MISQ Executive, 6, 3, 127–145.
Rockart, J., Earl, M. et al., (1996) “Eight Imperatives for the New IT Organization”, Sloan Management Review, Fall, 1–25.
Ropponen, J. (1999) “Risk Assessment and Management Practices in Software Development”, in Willcocks, L. and Lester, S. (eds) Beyond the IT Productivity Paradox, Wiley, Chichester.
Sanders, P. (1982) “Phenomenology: A New Way of Viewing Organizational Research”, Academy of Management Review, 7, 3, 353–360.
Sauer, C. and Willcocks, L. (2007) “Unreasonable Expectations — NHS IT, Greek Choruses and the Games Institutions Play around Mega-Programmes”, in Sauer, C. and Willcocks, L. (eds) NHS Special Issue, Journal of Information Technology, 22, 3.
Shepherd, AJ. (1995) IT Outsourcing Hype and Reality: A Practitioner Perspective. Oxford Institute of Information Management, RDP85/6: 31, Templeton College, Oxford.
Strassmann, P. (1998) “The Squandered Computer”, Information Economics Press, New Canaan.
Tho, I. (2005) Managing the Risks of IT Outsourcing, Butterworth Heinemann, Oxford.
Thomas, K. and Schneider, K. (1997) “Ernst and Young Scraps 45 Million Pound Model FM Deal”, Computer Weekly, March 13, 1.
Vowler, J. (1996) “Management: Lessons in Outsourcing”, Computer Weekly, 26.
Walker, C. (1996) “Giant Contracts Boost UK Outsourcing Growth”, Computer Weekly, 12.
Walsham, G. and Sahay, S. (1999) “GIS For District-Level Administration In India: Problems and Opportunities”, MIS Quarterly, 23, 1, 39–65.
White, R. and James, B. (1996) The Outsourcing Manual, Gower, London.
Willcocks, L. (1994) “Managing Information Systems in UK Public Administration: Issues and Prospects”, Public Administration, 72, 1, 13–32.
Willcocks, L. (1998) “Reducing the Risks of Outsourced IT”, in Financial Times (ed.) Mastering Global Business, Financial Times/Pitman, London.
Willcocks, L. and Choi, C. (1995) “Co-operative Partnership and Total IT Outsourcing: From Contractual Obligation to Strategic Alliance”, European Management Journal, 13, 1, 67–78.
Willcocks, L. and Craig, A. (2007) The Outsourcing Enterprise 4 — Building Retained Core Capabilities, Logica, London.
Willcocks, L. and Craig, A. (2009) The Outsourcing Enterprise 5 — Step Change: Collaborating To Innovate, Logica, London.
Willcocks, L. and Currie, W. (1998) “Information Technology in Public Services: Towards the Contractual Organization?”, British Journal Of Management, 8, S107–120.
Willcocks, L. and Fitzgerald, G. (1994a) A Business Guide To IT Outsourcing, Business Intelligence, London.
Willcocks, L. and Fitzgerald, G. (1994b) IT Outsourcing and the Changing Shape of the Information Systems Function: Recent Research Findings. Oxford, Oxford Institute of Information Management, Research and Discussion Paper, Templeton College, Oxford.
Willcocks, L., Fitzgerald, G. and Feeny, D. (1995) “IT Outsourcing: A Strategic Approach”, Long Range Planning, 28, 5, 59–70.
Willcocks, L., Fitzgerald, G. and Lacity, M. (1996) “To Outsource IT or Not? Recent Research on Economics and Evaluation Practice”, European Journal of In formation Systems, 5, 143–160.
Willcocks, L. and Griffiths, C. (1996) “Predicting Risk of Failure in Large-Scale Information Technology Projects”, Technological Forecasting and Social Change, 47, 205–228.
Willcocks, L. and Kern, T. (1997) IT Outsourcing as Strategic Partnering: The Case of the UK Inland Revenue. Proceedings of the Fifth European Conference in Information Systems, June, Cork, Ireland.
Willcocks, L. and Lacity, M. (eds) (1998) Strategic Sourcing Of Information Systems, Wiley, Chichester.
Willcocks, L. and Lacity, M. (1999) “IT Outsourcing in Insurance Services: Risk, Creative Contracting and Business Advantage”, Information Systems Journal, 9, 163–180.
Willcocks, L. and Lacity, M. (2000) “Strategic Dimensions in IT Outsourcing”, in Davenport, T. and Marchand, D. (eds) Mastering Information Management, FT/Pitman, London.
Willcocks, L. and Lacity, M. (2006) Global Sourcing of Business and IT Services, Palgrave, London.
Willcocks, L. and Lacity, M. (2009) Research Studies in Information Technology Outsourcing: Perspectives, Practices and Globalization. Volume 1 — Making IT Outsourcing Decisions; Volume 2 — Managing Outsourcing Relationships; Volume 3 — Global Outsourcing: Issues and Trends, Sage, London.
Willcocks, L., Lacity, M. and Fitzgerald, G. (1995) “IT Outsourcing in Europe and the USA: Assessment Issues”, International Journal Of Information Management, 15, 5, 333–351.
Willcocks, L., Lacity, M. and Kern, T. (1999) “Risk Mitigation in IT Outsourcing Strategy Revisited: Longitudinal Case Research”, Journal of Strategic Information Systems, April, 8, 2, 285–314.
Willcocks, L. and Lee, A. (2008) Series Introduction to Major Currents In the Information Systems Field, Sage, London. Six volumes.
Willcocks, L. and Margetts, H. (1994) “Risk Assessment in Information Systems”, European Journal Of Information Systems, 4, 1, 1–12.
Williamson, O. (1996) The Mechanisms Of Governance, Oxford University Press, Oxford.
Copyright information
© 2009 Leslie Willcocks, Mary Lacity and Thomas Kern
About this chapter
Cite this chapter
Willcocks, L., Lacity, M., Kern, T. (2009). IT Outsourcing in Public Sector Contexts: Researching Risk and Strategy. In: The Practice of Outsourcing. Palgrave Macmillan, London. https://doi.org/10.1057/9780230240841_6
Download citation
DOI: https://doi.org/10.1057/9780230240841_6
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-30202-4
Online ISBN: 978-0-230-24084-1
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)